CVE-2017-6157
high-risk
Published 2017-10-27
In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, GTM, Link Controller, PEM and Websafe software version 12.0.0 to 12.1.1, 11.6.0 to 11.6.1, 11.5.0 - 11.5.4, virtual servers with a configuration using the HTTP Explicit Proxy functionality and/or SOCKS profile are vulnerable to an unauthenticated, remote attack that allows modification of BIG-IP system configuration, extraction of sensitive system files, and/or possible remote command execution on the BIG-IP system.
Do I need to act?
~
6.9% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.1/10
High
NETWORK
/ HIGH complexity
Affected Products (20)
Affected Vendors
References (6)
Third Party Advisory
http://www.securityfocus.com/bid/101634
Third Party Advisory
http://www.securitytracker.com/id/1039672
Vendor Advisory
https://support.f5.com/csp/article/K02692210
Third Party Advisory
http://www.securityfocus.com/bid/101634
Third Party Advisory
http://www.securitytracker.com/id/1039672
Vendor Advisory
https://support.f5.com/csp/article/K02692210
58
/ 100
high-risk
Severity
24/34 · High
Exploitability
9/34 · Low
Exposure
25/34 · High